Defensive Security Podcast
433 FOLLOWERS
Defensive Security is a cyber security podcast covering breaches and strategies for defense.
Defensive Security Podcast
1y ago
https://www.bleepingcomputer.com/news/security/cosmicstrand-uefi-malware-found-in-gigabyte-asus-motherboards/
https://www.bleepingcomputer.com/news/security/hackers-scan-for-vulnerabilities-within-15-minutes-of-disclosure/
https://www.techcircle.in/2022/07/31/paytm-mall-refutes-cyber-breach-report-says-users-data-safe ..read more
Defensive Security Podcast
1y ago
Stories:
https://www.scmagazine.com/feature/incident-response/why-solarwinds-just-may-be-one-of-the-most-secure-software-companies-in-the-tech-universe
https://www.computerweekly.com/news/252522789/Log4Shell-on-its-way-to-becoming-endemic
https://www.bleepingcomputer.com/news/security/hackers-impersonate-cybersecurity-firms-in-callback-phishing-attacks/
https://www.cybersecuritydive.com/news/microsoft-rollback-macro-blocking-office/627004/
jerry: [00:00:00] All right, here we go today. Sunday, July 17th. 2022. And this is episode 268. Of the defensive security podcast. My name is Jerry ..read more
Defensive Security Podcast
1y ago
Defensive Security Podcast Episode 267
jerry: [00:00:00] Alright, here we go. Today is Sunday, July 10th, 2022. And this is episode 267 of the defensive security podcast. My name is Jerry Bell and joining me tonight as always. Is Mr. Andrew Kellett.
Andy: Good evening, Jerry, how are you? Good, sir.
jerry: I’m doing great. How are you doing?
Andy: I’m good man. It’s hot and steamy in Atlanta. Tell you that much.
jerry: Yeah. I ‘ve been back for a month from my beach place. And I think today’s the first day that we’ve not had a heat advisory. [00:01:00]
Andy: Yeah, that’s crazy.
jerry: which it ..read more
Defensive Security Podcast
2y ago
https://www.csoonline.com/article/3660560/uber-cisos-trial-underscores-the-importance-of-truth-transparency-and-trust.html
https://thehackernews.com/2022/06/conti-leaks-reveal-ransomware-gangs.html?m=1
https://www.bleepingcomputer.com/news/security/new-symbiote-malware-infects-all-running-processes-on-linux-systems/
https://doublepulsar.com/bpfdoor-an-active-chinese-global-surveillance-tool-54b078f1a896 ..read more
Defensive Security Podcast
2y ago
Google Exposes Initial Access Broker Ties With Ransomware Actors (bankinfosecurity.com)
Okta says hundreds of companies impacted by security breach | TechCrunch
Okta: “We made a mistake” delaying the Lapsus$ hack disclosure (bleepingcomputer.com)
Microsoft confirms Lapsus$ breach after hackers publish Bing, Cortana source code | TechCrunch
DEV-0537 criminal actor targeting organizations for data exfiltration and destruction – Microsoft Security Blog
Sabotage: Code added to popular NPM package wiped files in Russia and Belarus | Ars Technica
President Biden Signs into Law the Cyber Incident Rep ..read more
Defensive Security Podcast
2y ago
Adafruit discloses data leak from ex-employee’s GitHub repo (bleepingcomputer.com)
Malware now using NVIDIA’s stolen code signing certificates (bleepingcomputer.com)
NSA report: This is how you should be securing your network | ZDNet
  ..read more
Defensive Security Podcast
2y ago
https://www.govinfosecurity.com/data-breach-exposes-booking-details-19-million-customers-a-18505
https://www.helpnetsecurity.com/2022/02/11/cloud-security-training/
https://www.bankinfosecurity.com/massive-breach-hits-500-e-commerce-sites-a-18492
https://www.darkreading.com/cloud/linux-malware-on-the-rise-including-illicit-use-of-cobalt-strike
https://www.darkreading.com/attacks-breaches/google-cuts-account-compromises-in-half-with-simple-change ..read more
Defensive Security Podcast
2y ago
https://www.darkreading.com/edge-threat-monitor/most-common-cause-of-data-breach-in-2021-phishing-smishing-bec
https://www.bleepingcomputer.com/news/security/fbi-shares-lockbit-ransomware-technical-details-defense-tips/
https://www.csoonline.com/article/3648991/dhs-announces-the-creation-of-the-cyber-safety-review-board.html
https://www.darkreading.com/application-security/disclosure-panic-patch-can-we-do-better ..read more
Defensive Security Podcast
2y ago
https://www.bleepingcomputer.com/news/security/hackers-are-taking-over-ceo-accounts-with-rogue-oauth-apps/
https://blog.f-secure.com/insight-from-a-large-scale-phishing-study/
https://www.darkreading.com/attacks-breaches/log4j-proved-public-disclosure-still-helps-attackers
https://www.csoonline.com/article/3647756/how-to-prioritize-and-remediate-vulnerabilities-in-the-wake-of-log4j-and-microsofts-patch-tuesday-b.html ..read more
Defensive Security Podcast
2y ago
https://www.csoonline.com/article/3647209/why-you-should-secure-your-embedded-server-management-interfaces.html
https://www.csoonline.com/article/3646613/cybercrime-group-elephant-beetle-lurks-inside-networks-for-months.html
https://www.zdnet.com/article/when-open-source-developers-go-bad/
https://www.bleepingcomputer.com/news/microsoft/microsoft-resumes-rollout-of-january-windows-server-updates ..read more